These devices have almost the same categories as the wearables, so the results are similar:
- Authentication: as it happened with wearables, “Exploitation for credential access” is the technique selected in this category.
- Insecure pairing method: the pairing method in smart home IoT devices can also be affected by the “Adversary-in-the-Middle” attack detailed in the wearables section.
- Unencrypted Communications: if the device does not use Bluetooth communications, the only technique adversaries may use is “Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol”.
- Static MAC address if the device uses a static MAC address, the device is exposed, as it happened with wearables, to the technique “System Network Configuration Discovery”.
- Transmission of sensitive information to third-party servers: as these devices are linked to the cloud, they will be affected by techniques like “Data from cloud storage object”.
- Sending of information and firmware updates via HTTP: as was the case with wearables, these devices are exposed to techniques such as “Network Sniffing” that capture the information sent via HTTP.
Therefore, three techniques should be considered: “Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol”, “System Network Configuration Discovery” and “Data from cloud storage object”. These techniques have worse detection coverage while being commonly used by the selected cyber-criminal groups.